Analysis

  • max time kernel
    205s
  • max time network
    239s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/05/2023, 18:28

General

  • Target

    cefe93b3e0ddf18ee27c9e015d5a281f439ac2c011bda00ae9daeac2a40b0796.exe

  • Size

    697KB

  • MD5

    310f87bf300cd7f9e3facc9cdd3c62e5

  • SHA1

    3c5d02995b2fc64f73be6323e34f50f2c32745f6

  • SHA256

    cefe93b3e0ddf18ee27c9e015d5a281f439ac2c011bda00ae9daeac2a40b0796

  • SHA512

    7c6d2f57ac003faa24f9e90fe14f95ecfc19066d4edb82cceed1d85f53cef475a06ba2d0a858ab5753cf9cac88d56b81956ad66c07b86a3f170268cfba20f959

  • SSDEEP

    12288:Qy90Sk8BNjbyTX7TGgTlJNd240p0lAf3wHiroKUkw40vCrrOUlEf5fP:QyNBRy7a2F240pDf3wHiKirrOUKf5fP

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cefe93b3e0ddf18ee27c9e015d5a281f439ac2c011bda00ae9daeac2a40b0796.exe
    "C:\Users\Admin\AppData\Local\Temp\cefe93b3e0ddf18ee27c9e015d5a281f439ac2c011bda00ae9daeac2a40b0796.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4800
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un906325.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un906325.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3236
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73199934.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73199934.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4876
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk974750.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk974750.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1812

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un906325.exe

    Filesize

    543KB

    MD5

    c340a5a315dc9a4763de5e3439d42b2a

    SHA1

    ee0d41784d3dcbb1add1cf10316f6a796eb1bade

    SHA256

    938c8342fb500963a2ee815ff05dee43e68d61001bf0757809ad70f7deca1b21

    SHA512

    33ea6f90ec30f8106ec9fbbe46d25b80c16177940e9e55fe8b78d2260ecf41c512b2845e64cac25a96c73fbae5fa3b224069679ef5a1bf7e8febfd430ab4f771

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un906325.exe

    Filesize

    543KB

    MD5

    c340a5a315dc9a4763de5e3439d42b2a

    SHA1

    ee0d41784d3dcbb1add1cf10316f6a796eb1bade

    SHA256

    938c8342fb500963a2ee815ff05dee43e68d61001bf0757809ad70f7deca1b21

    SHA512

    33ea6f90ec30f8106ec9fbbe46d25b80c16177940e9e55fe8b78d2260ecf41c512b2845e64cac25a96c73fbae5fa3b224069679ef5a1bf7e8febfd430ab4f771

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73199934.exe

    Filesize

    265KB

    MD5

    36b4110606df7ece8547abff4435f15c

    SHA1

    6348fbf5f984d13d44fbb507c8524a185fd975a3

    SHA256

    85fd98a9f460882dda7e5a4a7760e22d2e67df102c0f947e3d1a1c23d86c0262

    SHA512

    c59f9fd451cc6cf2b5b5ff935da9f069c3a1ffd76e0a9471b5b9608a7cf6a89c1c3eccc280ae6b29509cd95a2e50ac30ac1d26502d48cdac531b4066e244fc7b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73199934.exe

    Filesize

    265KB

    MD5

    36b4110606df7ece8547abff4435f15c

    SHA1

    6348fbf5f984d13d44fbb507c8524a185fd975a3

    SHA256

    85fd98a9f460882dda7e5a4a7760e22d2e67df102c0f947e3d1a1c23d86c0262

    SHA512

    c59f9fd451cc6cf2b5b5ff935da9f069c3a1ffd76e0a9471b5b9608a7cf6a89c1c3eccc280ae6b29509cd95a2e50ac30ac1d26502d48cdac531b4066e244fc7b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk974750.exe

    Filesize

    347KB

    MD5

    6cd9522ba9db48589e0085f47aeb717e

    SHA1

    9daeda7fabd61ab5b7bb5b948b0a2c3731dc75dc

    SHA256

    059f3d438caa8805d3396d80a8a34f13cb95d388585832cf3553431174e716b1

    SHA512

    162667738664ed8a3dc23c16f8a51e60d1625933a67b51cdadf1407d508dc5a003da2c8809742f491f7455ca18083d35d5489577a1927303464756d787375a45

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk974750.exe

    Filesize

    347KB

    MD5

    6cd9522ba9db48589e0085f47aeb717e

    SHA1

    9daeda7fabd61ab5b7bb5b948b0a2c3731dc75dc

    SHA256

    059f3d438caa8805d3396d80a8a34f13cb95d388585832cf3553431174e716b1

    SHA512

    162667738664ed8a3dc23c16f8a51e60d1625933a67b51cdadf1407d508dc5a003da2c8809742f491f7455ca18083d35d5489577a1927303464756d787375a45

  • memory/1812-216-0x0000000004D40000-0x0000000004D75000-memory.dmp

    Filesize

    212KB

  • memory/1812-237-0x00000000048B0000-0x00000000048C0000-memory.dmp

    Filesize

    64KB

  • memory/1812-998-0x00000000048B0000-0x00000000048C0000-memory.dmp

    Filesize

    64KB

  • memory/1812-995-0x00000000048B0000-0x00000000048C0000-memory.dmp

    Filesize

    64KB

  • memory/1812-994-0x000000000A450000-0x000000000A48C000-memory.dmp

    Filesize

    240KB

  • memory/1812-993-0x000000000A330000-0x000000000A43A000-memory.dmp

    Filesize

    1.0MB

  • memory/1812-992-0x000000000A310000-0x000000000A322000-memory.dmp

    Filesize

    72KB

  • memory/1812-991-0x0000000009C60000-0x000000000A278000-memory.dmp

    Filesize

    6.1MB

  • memory/1812-989-0x00000000048B0000-0x00000000048C0000-memory.dmp

    Filesize

    64KB

  • memory/1812-988-0x00000000048B0000-0x00000000048C0000-memory.dmp

    Filesize

    64KB

  • memory/1812-196-0x0000000004D40000-0x0000000004D75000-memory.dmp

    Filesize

    212KB

  • memory/1812-242-0x00000000048B0000-0x00000000048C0000-memory.dmp

    Filesize

    64KB

  • memory/1812-192-0x0000000004D40000-0x0000000004D75000-memory.dmp

    Filesize

    212KB

  • memory/1812-191-0x0000000004D40000-0x0000000004D75000-memory.dmp

    Filesize

    212KB

  • memory/1812-236-0x0000000002F40000-0x0000000002F86000-memory.dmp

    Filesize

    280KB

  • memory/1812-206-0x0000000004D40000-0x0000000004D75000-memory.dmp

    Filesize

    212KB

  • memory/1812-222-0x0000000004D40000-0x0000000004D75000-memory.dmp

    Filesize

    212KB

  • memory/1812-220-0x0000000004D40000-0x0000000004D75000-memory.dmp

    Filesize

    212KB

  • memory/1812-218-0x0000000004D40000-0x0000000004D75000-memory.dmp

    Filesize

    212KB

  • memory/1812-214-0x0000000004D40000-0x0000000004D75000-memory.dmp

    Filesize

    212KB

  • memory/1812-212-0x0000000004D40000-0x0000000004D75000-memory.dmp

    Filesize

    212KB

  • memory/1812-210-0x0000000004D40000-0x0000000004D75000-memory.dmp

    Filesize

    212KB

  • memory/1812-208-0x0000000004D40000-0x0000000004D75000-memory.dmp

    Filesize

    212KB

  • memory/1812-194-0x0000000004D40000-0x0000000004D75000-memory.dmp

    Filesize

    212KB

  • memory/1812-202-0x0000000004D40000-0x0000000004D75000-memory.dmp

    Filesize

    212KB

  • memory/1812-239-0x00000000048B0000-0x00000000048C0000-memory.dmp

    Filesize

    64KB

  • memory/1812-204-0x0000000004D40000-0x0000000004D75000-memory.dmp

    Filesize

    212KB

  • memory/1812-198-0x0000000004D40000-0x0000000004D75000-memory.dmp

    Filesize

    212KB

  • memory/1812-200-0x0000000004D40000-0x0000000004D75000-memory.dmp

    Filesize

    212KB

  • memory/4876-169-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

    Filesize

    76KB

  • memory/4876-171-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

    Filesize

    76KB

  • memory/4876-151-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4876-149-0x0000000000400000-0x0000000002B9D000-memory.dmp

    Filesize

    39.6MB

  • memory/4876-150-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4876-186-0x0000000000400000-0x0000000002B9D000-memory.dmp

    Filesize

    39.6MB

  • memory/4876-183-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4876-148-0x0000000004670000-0x000000000469D000-memory.dmp

    Filesize

    180KB

  • memory/4876-181-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

    Filesize

    76KB

  • memory/4876-179-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

    Filesize

    76KB

  • memory/4876-177-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

    Filesize

    76KB

  • memory/4876-175-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

    Filesize

    76KB

  • memory/4876-173-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

    Filesize

    76KB

  • memory/4876-167-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

    Filesize

    76KB

  • memory/4876-165-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

    Filesize

    76KB

  • memory/4876-163-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

    Filesize

    76KB

  • memory/4876-161-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

    Filesize

    76KB

  • memory/4876-159-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

    Filesize

    76KB

  • memory/4876-157-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

    Filesize

    76KB

  • memory/4876-155-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

    Filesize

    76KB

  • memory/4876-154-0x0000000004CB0000-0x0000000004CC3000-memory.dmp

    Filesize

    76KB

  • memory/4876-153-0x0000000004670000-0x000000000469D000-memory.dmp

    Filesize

    180KB

  • memory/4876-152-0x0000000007220000-0x00000000077C4000-memory.dmp

    Filesize

    5.6MB